Explores BGP security weaknesses, real-world incidents, and defenses against BGP hijacking, emphasizing the importance of cryptography in securing routing information.
Discusses the OAuth 2.0 Authorization Framework, client challenges, authorization grants, and security vulnerabilities like phishing attacks and session fixation.
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.